Learn More
— There is a growing demand for network devices capable of examining the content of the Data packet in order to improve the network security and provide application specific services. Most high performance systems that perform deep packet inspection implement simple string matching algorithms to match packets against a large but finite set of strings(More)
Large Volumes of personal data is regularly collected from different sources and analyzed by different types of applications using data mining algorithms , sharing of these data is useful to the application users.On one hand it is an important asset to business organizations and governments for decision making at the same time analysing such data opens(More)
In now a days Password authentication plays a vital role typing biometrics as a transparent layer of user authentication for security. Keystroke authentication provides security to the applications like electronic mail, banking and any other web services etc., There are several types of techniques to protect our passwords but it can be easily hacked by the(More)
The problem for filtering certain classes of systems which incorporate nonlinear, uncertainty initial condition is addressed. An extended risk-sensitive filter (ERSF) is reexamined and, new iterated version of that ERSF called the iterated extended risk sensitive filters (IERSF) is developed. An ERSF weakness specifically accumulation error in the computing(More)
A Mobile Ad Hoc Network (MANET) is a self-organizing, infrastructure less, multi-hop network and mobile nodes are free to move in any network. Due to their lack of centralized control, and dynamic topology, MANETs are vulnerable to many attacks. From a security design perspective, there is no built-in security. So, security is one of the main concerns in ad(More)
  • 1